Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Hsien-Wei Hung"'
Autor:
null Chia-Nan Kao, null Yung-Cheng Chang, null Nen-Fu Huang, I Salim S, null I-Ju Liao, null Rong-Tai Liu, null Hsien-Wei Hung
Publikováno v:
CNS
Zero-day attack is a critical network attack. The zero-day attack period (ZDAP) is the period from the release of malware/exploit until a patch becomes available. IDS/IPS cannot effectively block zero-day attacks because they use pattern-based signat
Autor:
Nen-Fu Huang, Rong-Tai Liu, Yung-Cheng Chang, Che-Wei Lin, Chia-Nan Kao, I-Ju Liao, Hsien-Wei Hung
Publikováno v:
2015 IEEE International Conference on Communication Software and Networks (ICCSN).
The common means of defense for network security systems is to block the intrusions by matching the signatures. Intrusion-signature matching is the critical operation. However, small and medium-sized enterprise (SME) or Small Office Home Office (SOHO
Publikováno v:
NetSoft
Network anti-virus (AV) solutions are the first line of defense against malicious software. Traditional proxy-based network anti-virus solutions with store-scan-forward techniques decrease network performance and consume massive amounts of memory. Th
Publikováno v:
APCC
As a result of continually changing Internet and applications, more and more advanced features are requested to be available in the appliance for more accurately monitoring and managing the network. Therefore, modern networking appliances are equippe
Publikováno v:
ICC
Connection tracking by manipulating session tables is essential for stateful inspection capable applications such as stateful firewalls, network-based intrusion prevention systems (NIPS), traffic accounting and monitoring to process packets according
Publikováno v:
AINA Workshops
By the development of network applications, network security issues are getting more and more important. This paper proposes a multiple-pattern matching algorithm for the network intrusion detection systems based on the GPU (Graphics Processing Units
Autor:
Hsien-Wei Hung, Ming-chang Shih, Yang-fang Huang, Chia-Nan Kao, Yi-Hsuan Feng, Nen-Fu Huang, Chih-Hao Chen
Publikováno v:
ICC
This paper proposes a scalable and high available (HA) architecture for implementing cost effective security switches. In this architecture, each "security switch" consists of a traditional layer-2 switch and a "security switch engine (SSE)" which pr
Autor:
Chao-Ping Yu, Canaan Kao, Ko-Shung Chen, Hsien-Wei Hung, Rong-Tai Liu, Yi-Chung Chen, Nen-Fu Huang
Publikováno v:
AINA (2)
We propose a distributed architecture of Web filtering system focused on its operation and implementation for IPv6 home networks. The realized system, called WKeeper, employs the feature of IPv6 anycast to achieve distributed load balance. WKeeper ha
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540230342
ICOIN
ICOIN
The current intrusion detection systems faced the problem of generating too many false alerts. The raising alerts are too elementary and do not accurate enough to be managed by a security administrator. Several alert correlation techniques have been
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0d94cc2084c353bbdb28f7f3354ae1d9
https://doi.org/10.1007/978-3-540-25978-7_89
https://doi.org/10.1007/978-3-540-25978-7_89
Publikováno v:
Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft); 2015, p1-5, 5p